Edward H. Freeman
Data encryption refers to the methods used to prepare messages that cannot be understood without additional information. Government agencies, private individuals, civil libertarians, and the computer industry have all worked to develop methods of data encryption that will guarantee individual and societal rights.
The Clinton administrations proposed new standards for encryption technology the Clipper Chip was supposed to be the answer to the individuals concern for data security and the governments concern for law enforcement. Law-abiding citizens would have access to the encryption they need and the criminal element would be unable to use encryption to hide their illicit activity.
CRYPTOGRAPHY AND SECRET MESSAGES
Cryptography is the science of secure and secret communications. This security allows the sender to transform information into a coded message by using a secret key, a piece of information known only to the sender and the authorized receiver. The authorized receiver can decode the cipher to recover hidden information. If unauthorized individuals somehow receive the coded message, they should be unable to decode it without knowledge of the key.
The first recorded use of cryptography for correspondence was the Skytale created by the Spartans 2,500 years ago. The Skytale consisted of a staff of wood around which a strip of papyrus was tightly wrapped. The secret message was written on the parchment down the length of the staff. The parchment was then unwound and sent on its way. The disconnected letters made no sense unless the parchment was rewrapped around a staff of wood that was the same size as the first staff.
Methods of encoding and decoding messages have always been a factor in wartime strategies. The American effort that cracked Japanese ciphers during World War II played a major role in Allied strategy. At the end of the war, cryptography and issues of privacy remained largely a matter of government interest that were pursued by organizations such as the National Security Agency, which routinely monitors foreign communications.
Today, data bases contain extensive information about every individuals finances, health history, and purchasing habits. These data are routinely transferred or made accessible by telephone networks, often using an inexpensive personal computer and modem.
The government and private organizations realize and individuals expect certain standards to be met to maintain personal privacy. For example:
The Privacy Act of 1974
The Privacy Act of 1974 addressed some of these issues, particularly as they relate to government and financial activities. Congress adopted the Privacy Act to provide safeguards for an individual against an invasion of privacy. Under the Privacy Act, individuals decide which records kept by a federal agency or bureau are important to them. They can insist that these data be used only for the purposes for which the information was collected. Individuals have the right to see the information and to get copies of it. They may correct mistakes or add important details when necessary.
Federal agencies must keep the information organized so it is readily available. They must try to keep it accurate and up-to-date, using it only for lawful purposes. If an individuals rights are infringed upon under the Act, that person can bring suit in a federal district court for damages and obtain a court order directing the agency to obey the law.
The Fair Credit Reporting Act of 1970
The Fair Credit Reporting Act of 1970 requires consumer reporting and credit agencies to disclose information in their files to affected consumers. Consumers have the right to challenge any information that may appear in their files. Upon written request from the consumer, the agency must investigate the completeness or accuracy of any item contained in that individuals files. The agency must then either remove the information or allow the consumer to file a brief statement setting forth the nature of the dispute.
Researchers are continuing to develop sophisticated methods to protect personal data and communications from unlawful interception. In particular, the development of electronic funds transfer systems, where billions of dollars are transferred electronically, has emphasized the need to keep computerized communications accurate and confidential.
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.